Starting Load/Save RF Kill Switch Status... Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.155' (ECDSA) to the list of known hosts. syzkaller login: [ 67.223585][ T8519] IPVS: ftp: loaded support on port[0] = 21 [ 67.324382][ T8519] chnl_net:caif_netlink_parms(): no params data found [ 67.376307][ T8519] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.383955][ T8519] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.393740][ T8519] device bridge_slave_0 entered promiscuous mode [ 67.403032][ T8519] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.410728][ T8519] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.419168][ T8519] device bridge_slave_1 entered promiscuous mode [ 67.440498][ T8519] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.451279][ T8519] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.473668][ T8519] team0: Port device team_slave_0 added [ 67.481609][ T8519] team0: Port device team_slave_1 added [ 67.499787][ T8519] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.506808][ T8519] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.534055][ T8519] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.548071][ T8519] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.555016][ T8519] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.582458][ T8519] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.609457][ T8519] device hsr_slave_0 entered promiscuous mode [ 67.616569][ T8519] device hsr_slave_1 entered promiscuous mode [ 67.713295][ T8519] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 67.724580][ T8519] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 67.740284][ T8519] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 67.751861][ T8519] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 67.779777][ T8519] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.787016][ T8519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.794810][ T8519] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.801949][ T8519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.849423][ T8519] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.863135][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.874978][ T2998] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.883600][ T2998] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.892808][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 67.906269][ T8519] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.919655][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.928593][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.935734][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.957675][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.966630][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.973679][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.982311][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.001465][ T8519] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 68.012641][ T8519] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.026625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.034720][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.044502][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.054631][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.066703][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.083260][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.090741][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.104732][ T8519] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.125813][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.148426][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.157796][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.167670][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.177467][ T8519] device veth0_vlan entered promiscuous mode [ 68.190098][ T8519] device veth1_vlan entered promiscuous mode [ 68.211469][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 68.219892][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 68.228701][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.241882][ T8519] device veth0_macvtap entered promiscuous mode [ 68.252219][ T8519] device veth1_macvtap entered promiscuous mode [ 68.270967][ T8519] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.278879][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.289837][ T8727] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 68.301761][ T8519] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.309449][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.318575][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.331146][ T8519] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.340482][ T8519] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.351702][ T8519] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.360552][ T8519] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 68.433207][ T8519] [ 68.436056][ T8519] ============================= [ 68.440890][ T8519] WARNING: suspicious RCU usage [ 68.446014][ T8519] 5.10.0-rc2-syzkaller #0 Not tainted [ 68.451582][ T8519] ----------------------------- [ 68.456526][ T8519] drivers/net/bonding/bond_main.c:395 suspicious rcu_dereference_check() usage! [ 68.465996][ T8519] [ 68.465996][ T8519] other info that might help us debug this: [ 68.465996][ T8519] [ 68.477176][ T8519] [ 68.477176][ T8519] rcu_scheduler_active = 2, debug_locks = 1 [ 68.486435][ T8519] 1 lock held by syz-executor935/8519: [ 68.491904][ T8519] #0: ffff88801a651a68 (&net->xfrm.xfrm_cfg_mutex){+.+.}-{3:3}, at: xfrm_netlink_rcv+0x5c/0x90 [ 68.504074][ T8519] [ 68.504074][ T8519] stack backtrace: [ 68.510211][ T8519] CPU: 0 PID: 8519 Comm: syz-executor935 Not tainted 5.10.0-rc2-syzkaller #0 [ 68.518973][ T8519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.529018][ T8519] Call Trace: [ 68.532298][ T8519] dump_stack+0x107/0x163 [ 68.536614][ T8519] bond_ipsec_add_sa+0x1dc/0x240 [ 68.541659][ T8519] xfrm_dev_state_add+0x2da/0x7b0 [ 68.546706][ T8519] xfrm_add_sa+0x2166/0x34f0 [ 68.551290][ T8519] ? xfrm_get_sa+0x2c0/0x2c0 [ 68.555869][ T8519] ? bpf_lsm_capable+0x5/0x10 [ 68.560525][ T8519] ? security_capable+0x8f/0xc0 [ 68.565358][ T8519] ? __nla_parse+0x3d/0x50 [ 68.569763][ T8519] ? xfrm_get_sa+0x2c0/0x2c0 [ 68.574343][ T8519] xfrm_user_rcv_msg+0x42f/0x8b0 [ 68.579263][ T8519] ? xfrm_do_migrate+0x800/0x800 [ 68.584184][ T8519] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 68.590166][ T8519] ? __mutex_lock+0x626/0x10e0 [ 68.594911][ T8519] netlink_rcv_skb+0x153/0x420 [ 68.599655][ T8519] ? xfrm_do_migrate+0x800/0x800 [ 68.604570][ T8519] ? netlink_ack+0xaa0/0xaa0 [ 68.609154][ T8519] xfrm_netlink_rcv+0x6b/0x90 [ 68.613809][ T8519] netlink_unicast+0x533/0x7d0 [ 68.618557][ T8519] ? netlink_attachskb+0x810/0x810 [ 68.623648][ T8519] ? __phys_addr_symbol+0x2c/0x70 [ 68.628649][ T8519] ? __check_object_size+0x171/0x3f0 [ 68.633928][ T8519] netlink_sendmsg+0x856/0xd90 [ 68.638676][ T8519] ? netlink_unicast+0x7d0/0x7d0 [ 68.643598][ T8519] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 68.648861][ T8519] ? netlink_unicast+0x7d0/0x7d0 [ 68.653780][ T8519] sock_sendmsg+0xcf/0x120 [ 68.658179][ T8519] ____sys_sendmsg+0x6e8/0x810 [ 68.662921][ T8519] ? kernel_sendmsg+0x50/0x50 [ 68.667573][ T8519] ? do_recvmmsg+0x6c0/0x6c0 [ 68.672146][ T8519] ? find_held_lock+0x2d/0x110 [ 68.676896][ T8519] ___sys_sendmsg+0xf3/0x170 [ 68.681464][ T8519] ? sendmsg_copy_msghdr+0x160/0x160 [ 68.686732][ T8519] ? do_huge_pmd_anonymous_page+0x8e9/0x2050 [ 68.692699][ T8519] ? find_held_lock+0x2d/0x110 [ 68.697443][ T8519] ? __fget_light+0x215/0x280 [ 68.702103][ T8519] __sys_sendmsg+0xe5/0x1b0 [ 68.706587][ T8519] ? __sys_sendmsg_sock+0xb0/0xb0 [ 68.711615][ T8519] ? syscall_enter_from_user_mode+0x1d/0x50 [ 68.717491][ T8519] do_syscall_64+0x2d/0x70 [ 68.721888][ T8519] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.727769][ T8519] RIP: 0033:0x443b59 [ 68.731644][ T8519] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db 0b fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 68.751235][ T8519] RSP: 002b:00007ffef2d1ebf8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 68.759635][ T8519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443b59 [ 68.767599][ T8519] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 68.775549][ T8519] RBP: 00007ffef2d1ec10 R08: 00000000bb1414ac R09: 00000000bb1414ac [ 68.783502][ T8519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef2d1ec40 [ 68.791464][ T8519] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 68.806551][ T8519] bond0: (slave bond_slave_0): Slave does not support ipsec offload